Vulnerabilities Caused by Metric-based Policies in Reinforcement Learning Based Covert Communication Under Steering Attack

dc.contributor.authorJones, Alyse M.en
dc.contributor.authorCosta, Maiceen
dc.date.accessioned2025-08-04T18:19:57Zen
dc.date.available2025-08-04T18:19:57Zen
dc.date.issued2025-06-30en
dc.date.updated2025-08-01T07:52:00Zen
dc.description.abstractThis paper explores the concept of timeliness in covert communications when faced with eavesdropping and jamming. We consider a transmitter-receiver pair communicating over a wireless channel where the choice of a resource block (frequency, time) to transmit is the result of a Reinforcement Learning policy. The eavesdropper aims to detect a transmission to perform a steering attack. Using two multiarmed bandit systems, we investigate the problem of minimizing the Age of Information (AoI) regret at the legit receiver, while maximizing the AoI regret at the adversary. We present an upper bound for regret and demonstrate through simulations the validity of the bound and the vulnerabilities introduced by the use of metric-guided policies such as age-aware policies.en
dc.description.versionPublished versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.doihttps://doi.org/10.1145/3733965.3733973en
dc.identifier.urihttps://hdl.handle.net/10919/136952en
dc.language.isoenen
dc.publisherACMen
dc.rightsCreative Commons Attribution 4.0 Internationalen
dc.rights.holderThe author(s)en
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/en
dc.titleVulnerabilities Caused by Metric-based Policies in Reinforcement Learning Based Covert Communication Under Steering Attacken
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3733965.3733973.pdf
Size:
1.22 MB
Format:
Adobe Portable Document Format
Description:
Published version
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.5 KB
Format:
Item-specific license agreed upon to submission
Description: